Results 11 to 20 of about 4,724 (196)

Secrecy outage analysis for Alamouti space-time block coded non-orthogonal multiple access [PDF]

open access: yes, 2020
This letter proposed a novel transmission technique for physical layer security by applying the Alamouti Space-Time Block Coded Non-orthogonal Multiple Access (STBC-NOMA) scheme.
Dianati, Mehrdad   +5 more
core   +1 more source

Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

open access: yesIEEE Access, 2018
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi   +5 more
doaj   +1 more source

Generalized MGF-based secrecy outage performance analysis over fading channels using mixture gamma distribution

open access: yesICT Express, 2023
This paper proposes a novel method to provide secrecy outage performance in various fading environments using a mixture gamma (MG) distribution, which is well known to approximate numerous fading channel models.
Jinu Gong, Joonhyuk Kang
doaj   +1 more source

Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers [PDF]

open access: yes, 2015
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially random-distributed eavesdroppers.
Liu, Chenxi   +3 more
core   +2 more sources

Secrecy Outage Probability: Revisited.

open access: yesCoRR, 2022
This paper technically explores the secrecy rate $Λ$ and a maximisation problem over the concave version of the secrecy outage probability (SOP) as $\mathop{{\rm \mathbb{M}ax}}\limits_{Δ} {\rm \; } \mathbb{P}\mathscr{r} \big( Λ\ge λ\big) $. We do this from a generic viewpoint even though we use a traditional Wyner's wiretap channel for our system model
openaire   +4 more sources

Secrecy Outage Probability of Network-Coded Cooperative Communication

open access: yesCoRR, 2014
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate ...
João Luiz Rebelatto   +4 more
openaire   +2 more sources

The impact of dual‐signal selection and multiple eavesdroppers on secrecy performance in cooperative‐relay systems

open access: yesIET Communications, 2022
This paper investigates the impact of a dual‐signal selection (i.e. selection of direct signal and relay signal) and multiple eavesdroppers on secrecy outage probability in cooperative‐relay systems over Nakagami fading channels.
Donghun Lee
doaj   +1 more source

Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances

open access: yesIEEE Open Journal of the Communications Society, 2022
In this contribution, a thorough investigation of the performance of rate splitting is conducted in terms of outage and secrecy outage for the simultaneous service to a near user and far user, where the latter attempts to overhear the message of the ...
Milad Abolpour   +3 more
doaj   +1 more source

On Secrecy Outage Probability and Average Secrecy Rate of Large‐Scale Cellular Networks

open access: yesWireless Communications and Mobile Computing, 2018
We investigate the secrecy performance in large‐scale cellular networks, where both Base Stations (BSs) and eavesdroppers follow independent and different homogeneous Poisson point processes (PPPs). Based on the distances between the BS and user, the intended user selects the nearest BS as serving BS to transmit the confidential information.
Liwei Tao   +3 more
openaire   +1 more source

Secure Multiuser Scheduling for Hybrid Relay-Assisted Wireless Powered Cooperative Communication Networks With Full-Duplex Destination-Based Jamming

open access: yesIEEE Access, 2021
In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously.
Xiaohui Shang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy